Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26107: CWE-416: Use After Free in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2026-26107cvecve-2026-26107cwe-416
Published: Tue Mar 10 2026 (03/10/2026, 17:05:18 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:19:33 UTC

Technical Analysis

CVE-2026-26107 is a use-after-free vulnerability classified under CWE-416 affecting Microsoft Office Excel in Microsoft 365 Apps for Enterprise version 16.0.1. A use-after-free occurs when a program continues to use memory after it has been freed, leading to undefined behavior including potential code execution. In this case, an attacker can craft a malicious Excel document that, when opened by a user, triggers the vulnerability allowing execution of arbitrary code with the privileges of the user. The vulnerability requires no prior authentication or privileges but does require user interaction (opening the malicious file). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. The vulnerability is currently published but no patches or known exploits have been reported yet. This flaw could be leveraged for local privilege escalation or initial compromise in targeted attacks. The lack of a patch means organizations must rely on mitigations such as disabling macros, applying strict file handling policies, and user awareness until a fix is available.

Potential Impact

The vulnerability allows attackers to execute arbitrary code locally, potentially leading to full system compromise including data theft, system manipulation, or deployment of malware. Since Microsoft 365 Apps for Enterprise is widely used in corporate environments, exploitation could result in significant breaches affecting confidentiality, integrity, and availability of critical business data. Attackers could leverage this flaw to gain footholds in enterprise networks, escalate privileges, or move laterally. The requirement for user interaction limits mass exploitation but targeted spear-phishing campaigns could be highly effective. The absence of patches increases risk exposure. Organizations handling sensitive information or operating in regulated industries face heightened risks of data breaches, operational disruption, and compliance violations.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Enforce strict email and file filtering to block or quarantine suspicious Excel files, especially from untrusted sources. 2) Disable or restrict macros and ActiveX controls in Excel to reduce attack surface. 3) Educate users to avoid opening unexpected or suspicious Excel attachments. 4) Use application whitelisting to prevent execution of unauthorized code. 5) Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts. 6) Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 7) Monitor Microsoft security advisories closely and apply patches immediately upon release. 8) Consider isolating or sandboxing Excel processes in high-risk environments to contain potential exploits.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-02-11T15:52:13.909Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562fea502d3aa87d6af3

Added to database: 3/10/2026, 5:34:39 PM

Last enriched: 3/10/2026, 6:19:33 PM

Last updated: 3/14/2026, 1:37:05 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses